Abstract. We optimize the communication (and, indirectly, compu-tation) complexity of two-party secure function evaluation (SFE). We propose a new approach, which relies on the information-theoretic (IT) Garbled Circuit (GC), which is more efficient than Yao’s GC on shallow circuits. When evaluating a large circuit, we “slice ” it into thin layers and evaluate them with IT GC. Motivated by the client-server setting, we propose two variants of our construction: one for semi-honest model (relatively straightforward), and one secure against a semi-honest server and covert client (more technically involved). One of our new building blocks, String-selection Oblivious Transfer (SOT), may be of indepen-dent interest. Our approach offers asymptotic...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Secure Function Evaluation (SFE) allows two mutually mistrusting parties to compute an arbitrary fun...
Secure Function Evaluation (SFE) allows two mutually mistrusting parties to compute an arbitrary fun...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
General two-party Secure Function Evaluation (SFE) allows mutually distrusting parties to cor-rectly...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
We consider secure two-party computation in a multiple-execution setting, where two parties wish to ...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
Protocols for secure two-party computation enable a pair of mistrusting parties to compute a joint f...
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Abstract. We study efficiency tradeoffs for secure two-party computation in presence of malicious be...
Secure Function Evaluation (SFE) allows two mutually mistrusting parties to compute an arbitrary fun...
Secure Function Evaluation (SFE) allows two mutually mistrusting parties to compute an arbitrary fun...
Abstract. Secure two-party computation enables applications in which partic-ipants compute the outpu...
General two-party Secure Function Evaluation (SFE) allows mutually distrusting parties to cor-rectly...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
We consider secure two-party computation in a multiple-execution setting, where two parties wish to ...
Beginning with the work of Lindell and Pinkas, researchers have proposed several protocols for secur...
Protocols for secure two-party computation enable a pair of mistrusting parties to compute a joint f...
Abstract. We consider generic Garbled Circuit (GC)-based techniques for Secure Function Evaluation (...
In the setting of secure two-party computation, two parties wish to securely compute a joint functio...
Secure multi-party computation has been considered by the cryptographic community for a number of ye...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...
Secure two-party computation is used as the basis for a large variety of privacy-preserving protocol...
We propose a new two-party computation protocol using Yao’s garbled circuits, which is secure in the...